Ahmed Al-Gindy - Academia.edu (original) (raw)
Papers by Ahmed Al-Gindy
2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)
Open Computer Science
With the advent of high-speed broadband Internet access, the need to protect digital videos is hi... more With the advent of high-speed broadband Internet access, the need to protect digital videos is highly recommended. The main objective of this study is to propose an adaptive algorithm for watermarked digital videos in the frequency domain based on discrete cosine transform (DCT). The watermark signature image is embedded into the whole frame of the video. The green channel of the RGB frame is selected for the embedding process using the DCT algorithm as it shows the recommended quality of the watermarked frames. The experiment results indicate that the proposed algorithm shows robustness and high quality of the watermarked videos by testing various strength values ∆ for different videos. It offers resistance against different types of attacks.
Technology and Entrepreneurship Education, 2022
2021 International Conference on Engineering and Emerging Technologies (ICEET), 2021
Given the dependence of the modern society on networks, the importance of effective intrusion det... more Given the dependence of the modern society on networks, the importance of effective intrusion detection systems (IDS) cannot be underestimated. In this paper, we consider an autoencoder-based IDS for detecting distributed denial of service attacks (DDoS). The advantage of autoencoders over traditional machine learning methods is the ability to train on unlabeled data. As a result, autoencoders are well-suited for detecting unknown attacks. The key idea of the proposed approach is that anomalous traffic flows will have higher reconstruction loss which can be used to flag the intrusions. The results of numerical experiments show that the proposed method outperforms benchmark unsupervised algorithms in detecting DDoS attacks.
International Journal of Advanced Computer Science and Applications, 2021
2021 International Symposium on Networks, Computers and Communications (ISNCC), 2021
This paper presents the design of a fully-integrated RF low noise amplifier with active inductor ... more This paper presents the design of a fully-integrated RF low noise amplifier with active inductor linearizer. The proposed circuit achieves 16 dBc of third order intermodulation IM3 distortion cancellation at 1.9 GHz with 8 dB third-order intercept point IP3 improvement. The proposed circuit utilize an active inductor linearizer to improve linearity of the circuit and offering tunability. The simulation results show an overall proposed circuit peak gain is 14.5 dB and the minimum noise Figure is 0.75 dB at 1.9 GHz frequency with power consumption of 7.4 mA.
International Journal of Information and Education Technology, 2020
International Journal of Recent Technology and Engineering (IJRTE), 2019
This paper presents a three-levels Discrete Wavelet Transform (DWT) watermarking technique for co... more This paper presents a three-levels Discrete Wavelet Transform (DWT) watermarking technique for color images and watermarks. The proposed technique utilizes embedding the RGB watermark information into the Y channel of the YCbCr cover image. A pre-processor is used to convert the color watermark from RGB to a binary sequence. The pre-processed output is, then, inserted several times into the Y channel of the YCbCr cover image by changing the LL3 DWT coefficients. The robustness of the proposed scheme is verified through the ability to resist several classical attacks such as scaling, cropping, JPEG compression, median filtering and low pass filtering. In addition, the proposed scheme does not need the original host image to recover the watermark; hence, the recovery method is blind. This paper also includes a qualitative comparison between the one-level and two-levels DWT.
2015 International Conference on Developments of E-Systems Engineering (DeSE), 2015
This paper presents a modified algorithm for colour digital image watermarking. The 24 bits/pixel... more This paper presents a modified algorithm for colour digital image watermarking. The 24 bits/pixel RGB images are used and the watermark is placed on the green channel of the RGB image. The embedding and extraction processes have been carried out using the discrete cosine transform DCT. Image normalization process has been integrated and used to improve the robustness against geometric attacks. Handwritten signature has been used as a watermark and embedded into the host image using different watermarking strengths. Comparison between the original and modified algorithm is presented. Experimental results show that the normalization process has been useful to overcome the drawbacks in the original algorithm and improve robustness against geometric attacks such as translation, rotation, and scaling.
2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA)
Open Computer Science
With the advent of high-speed broadband Internet access, the need to protect digital videos is hi... more With the advent of high-speed broadband Internet access, the need to protect digital videos is highly recommended. The main objective of this study is to propose an adaptive algorithm for watermarked digital videos in the frequency domain based on discrete cosine transform (DCT). The watermark signature image is embedded into the whole frame of the video. The green channel of the RGB frame is selected for the embedding process using the DCT algorithm as it shows the recommended quality of the watermarked frames. The experiment results indicate that the proposed algorithm shows robustness and high quality of the watermarked videos by testing various strength values ∆ for different videos. It offers resistance against different types of attacks.
Technology and Entrepreneurship Education, 2022
2021 International Conference on Engineering and Emerging Technologies (ICEET), 2021
Given the dependence of the modern society on networks, the importance of effective intrusion det... more Given the dependence of the modern society on networks, the importance of effective intrusion detection systems (IDS) cannot be underestimated. In this paper, we consider an autoencoder-based IDS for detecting distributed denial of service attacks (DDoS). The advantage of autoencoders over traditional machine learning methods is the ability to train on unlabeled data. As a result, autoencoders are well-suited for detecting unknown attacks. The key idea of the proposed approach is that anomalous traffic flows will have higher reconstruction loss which can be used to flag the intrusions. The results of numerical experiments show that the proposed method outperforms benchmark unsupervised algorithms in detecting DDoS attacks.
International Journal of Advanced Computer Science and Applications, 2021
2021 International Symposium on Networks, Computers and Communications (ISNCC), 2021
This paper presents the design of a fully-integrated RF low noise amplifier with active inductor ... more This paper presents the design of a fully-integrated RF low noise amplifier with active inductor linearizer. The proposed circuit achieves 16 dBc of third order intermodulation IM3 distortion cancellation at 1.9 GHz with 8 dB third-order intercept point IP3 improvement. The proposed circuit utilize an active inductor linearizer to improve linearity of the circuit and offering tunability. The simulation results show an overall proposed circuit peak gain is 14.5 dB and the minimum noise Figure is 0.75 dB at 1.9 GHz frequency with power consumption of 7.4 mA.
International Journal of Information and Education Technology, 2020
International Journal of Recent Technology and Engineering (IJRTE), 2019
This paper presents a three-levels Discrete Wavelet Transform (DWT) watermarking technique for co... more This paper presents a three-levels Discrete Wavelet Transform (DWT) watermarking technique for color images and watermarks. The proposed technique utilizes embedding the RGB watermark information into the Y channel of the YCbCr cover image. A pre-processor is used to convert the color watermark from RGB to a binary sequence. The pre-processed output is, then, inserted several times into the Y channel of the YCbCr cover image by changing the LL3 DWT coefficients. The robustness of the proposed scheme is verified through the ability to resist several classical attacks such as scaling, cropping, JPEG compression, median filtering and low pass filtering. In addition, the proposed scheme does not need the original host image to recover the watermark; hence, the recovery method is blind. This paper also includes a qualitative comparison between the one-level and two-levels DWT.
2015 International Conference on Developments of E-Systems Engineering (DeSE), 2015
This paper presents a modified algorithm for colour digital image watermarking. The 24 bits/pixel... more This paper presents a modified algorithm for colour digital image watermarking. The 24 bits/pixel RGB images are used and the watermark is placed on the green channel of the RGB image. The embedding and extraction processes have been carried out using the discrete cosine transform DCT. Image normalization process has been integrated and used to improve the robustness against geometric attacks. Handwritten signature has been used as a watermark and embedded into the host image using different watermarking strengths. Comparison between the original and modified algorithm is presented. Experimental results show that the normalization process has been useful to overcome the drawbacks in the original algorithm and improve robustness against geometric attacks such as translation, rotation, and scaling.